|
Showing 1 - 9 of
9 matches in All Departments
This book constitutes the refereed proceedings of the 13th
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
2017, held in Beijing, China, in December 2017. The 39 revised full
papers presented were carefully reviewed and selected from 145
submissions. The papers address issues such as multi-hop wireless
networks and wireless mesh networks; sensor and actuator networks;
vehicle ad hoc networks; mobile social network; delay tolerant
networks and opportunistic networking; cyber-physical systems;
internet of things; system modeling and performance analysis;
routing and network protocols; data transport and management in
mobile networks; resource management and wireless QoS provisioning;
security and privacy; cross layer design and optimization; novel
applications and architectures.
|
Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers (Paperback, 2012)
Liqun Chen, Moti Yung, Liehuang Zhu
|
R1,579
Discovery Miles 15 790
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-conference
proceedings of the International Conference on Trusted Systems,
INTRUST 2011, held in Beijing, China, in November 2011. The 21
revised full papers were carefully reviewed and selected from 34
submissions for inclusion in the book. Except these contributed
papers the program of INTRUST also consisted of a workshop titled
Asian Lounge on Trust, Security and Privacy consisting of six
keynote speeches. The papers are organized in topical sections on
trusted services, mobile trusted systems, security analysis,
cryptographic aspects, trusted networks, implementation, and direct
anonymous attestation.
Mobile crowdsensing is a new sensing paradigm that utilizes the
intelligence of a crowd of individuals to collect data for mobile
purposes by using their portable devices, such as smartphones and
wearable devices. Commonly, individuals are incentivized to collect
data to fulfill a crowdsensing task released by a data requester.
This “sensing as a service” elaborates our knowledge of the
physical world by opening up a new door of data collection and
analysis. However, with the expansion of mobile crowdsensing,
privacy issues urgently need to be solved. In this book, we discuss
the research background and current research process of privacy
protection in mobile crowdsensing. In the first chapter, the
background, system model, and threat model of mobile crowdsensing
are introduced. The second chapter discusses the current techniques
to protect user privacy in mobile crowdsensing. Chapter three
introduces the privacy-preserving content-based task allocation
scheme. Chapter four further introduces the privacy-preserving
location-based task scheme. Chapter five presents the scheme of
privacy-preserving truth discovery with truth transparency. Chapter
six proposes the scheme of privacy-preserving truth discovery with
truth hiding. Chapter seven summarizes this monograph and proposes
future research directions. In summary, this book introduces the
following techniques in mobile crowdsensing: 1) describe a
randomizable matrix-based task-matching method to protect task
privacy and enable secure content-based task allocation; 2)
describe a multi-clouds randomizable matrix-based task-matching
method to protect location privacy and enable secure arbitrary
range queries; and 3) describe privacy-preserving truth discovery
methods to support efficient and secure truth discovery. These
techniques are vital to the rapid development of privacy-preserving
in mobile crowdsensing.
This book focuses on picturing B-IoT techniques from a few
perspectives, which are architecture, key technologies, security
and privacy, service models and framework, practical use cases and
more. Main contents of this book derive from most updated technical
achievements or breakthroughs in the field. A number of
representative IoT service offerings will be covered by this book,
such as vehicular networks, document sharing system, and
telehealth. Both theoretical and practical contents will be
involved in this book in order to assist readers to have a
comprehensive and deep understanding the mechanism of using
blockchain for powering up IoT systems. The blockchain-enabled
Internet of Things (B-IoT) is deemed to be a novel technical
alternative that provides network-based services with additional
functionalities, benefits, and implementations in terms of
decentralization, immutability, and auditability. Towards the
enhanced secure and privacy-preserving Internet of Things (IoT),
this book introduces a few significant aspects of B-IoT, which
includes fundamental knowledge of both blockchain and IoT,
state-of-the-art reviews of B-IoT applications, crucial components
in the B-IoT system and the model design, and future development
potentials and trends. IoT technologies and services, e.g. cloud
data storage technologies and vehicular services, play important
roles in wireless technology developments. On the other side,
blockchain technologies are being adopted in a variety of academic
societies and professional realms due to its promising
characteristics. It is observable that the research and development
on integrating these two technologies will provide critical
thinking and solid references for contemporary and future
network-relevant solutions. This book targets researchers and
advanced level students in computer science, who are focused on
cryptography, cloud computing and internet of things, as well as
electrical engineering students and researchers focused on
vehicular networks and more. Professionals working in these fields
will also find this book to be a valuable resource.
|
Trusted Computing and Information Security - 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Weili Han, Liehuang Zhu, Fei Yan
|
R1,580
Discovery Miles 15 800
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Chinese
Conference on Trusted Computing and Information Security, CTCIS
2019, held in Shanghai, China, in October 2019. The 22 revised full
papers presented were carefully reviewed and selected from 247
submissions. The papers are centered around cryptography, systems
security, trusted computing, information security, network
security, information hiding.
|
Blockchain Technology and Application - Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11-13, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, …
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Second CCF
China Blockchain Conference, CBCC 2019, held in Chengdu, China, in
October 2019. The 16 revised full papers presented were carefully
reviewed and selected from 112 submissions. The papers deal with
research results and development activities in all aspects of
blockchain science and technology.
This book focuses on picturing B-IoT techniques from a few
perspectives, which are architecture, key technologies, security
and privacy, service models and framework, practical use cases and
more. Main contents of this book derive from most updated technical
achievements or breakthroughs in the field. A number of
representative IoT service offerings will be covered by this book,
such as vehicular networks, document sharing system, and
telehealth. Both theoretical and practical contents will be
involved in this book in order to assist readers to have a
comprehensive and deep understanding the mechanism of using
blockchain for powering up IoT systems. The blockchain-enabled
Internet of Things (B-IoT) is deemed to be a novel technical
alternative that provides network-based services with additional
functionalities, benefits, and implementations in terms of
decentralization, immutability, and auditability. Towards the
enhanced secure and privacy-preserving Internet of Things (IoT),
this book introduces a few significant aspects of B-IoT, which
includes fundamental knowledge of both blockchain and IoT,
state-of-the-art reviews of B-IoT applications, crucial components
in the B-IoT system and the model design, and future development
potentials and trends. IoT technologies and services, e.g. cloud
data storage technologies and vehicular services, play important
roles in wireless technology developments. On the other side,
blockchain technologies are being adopted in a variety of academic
societies and professional realms due to its promising
characteristics. It is observable that the research and development
on integrating these two technologies will provide critical
thinking and solid references for contemporary and future
network-relevant solutions. This book targets researchers and
advanced level students in computer science, who are focused on
cryptography, cloud computing and internet of things, as well as
electrical engineering students and researchers focused on
vehicular networks and more. Professionals working in these fields
will also find this book to be a valuable resource.
This book mainly concentrates on protecting data security and
privacy when participants communicate with each other in the
Internet of Things (IoT). Technically, this book categorizes and
introduces a collection of secure and privacy-preserving data
communication schemes/protocols in three traditional scenarios of
IoT: wireless sensor networks, smart grid and vehicular ad-hoc
networks recently. This book presents three advantages which will
appeal to readers. Firstly, it broadens reader's horizon in IoT by
touching on three interesting and complementary topics: data
aggregation, privacy protection, and key agreement and management.
Secondly, various cryptographic schemes/protocols used to protect
data confidentiality and integrity is presented. Finally, this book
will illustrate how to design practical systems to implement the
algorithms in the context of IoT communication. In summary, readers
can simply learn and directly apply the new technologies to
communicate data in IoT after reading this book.
|
Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers (Paperback, 1st ed. 2015)
Moti Yung, Liehuang Zhu, Yanjiang Yang
|
R2,913
Discovery Miles 29 130
|
Ships in 10 - 15 working days
|
Normal 0 false false false EN-US X-NONE X-NONE This book
constitutes the thoroughly refereed post-conference proceedings of
the 6th International Conference on Trusted Systems, INTRUST 2014,
held in Beijing, China, in December 2014. The conference brings
together academic and industrial researchers, designers, and
implementers with end-users of trusted systems, in order to foster
the exchange of ideas in this challenging and fruitful area. The
revised full papers focus on the theory, technologies and
applications of trusted systems and cover all aspects of trusted
computing systems, including trusted modules, platforms, networks,
services and applications, from their fundamental features and
functionalities to design principles, architecture and
implementation technologies. /* Style Definitions */
table.MsoNormalTable {mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0;
mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes;
mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in; mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan; font-size:11.0pt;
font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times
New Roman"; mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Hampstead
Diane Keaton, Brendan Gleeson, …
DVD
R66
Discovery Miles 660
|